CVE-2026-7538

Totolink · A8000RU

The Totolink A8000RU router is vulnerable to remote OS command injection via the proto parameter in the CGI handler, allowing unauthenticated attackers to execute arbitrary system commands.

Executive summary

A critical OS command injection vulnerability in the Totolink A8000RU allows unauthenticated remote attackers to achieve full system-level code execution.

Vulnerability

The flaw resides in the /cgi-bin/cstecgi.cgi script, specifically within the proto argument. An unauthenticated attacker can inject shell commands that are executed with the privileges of the web server.

Business impact

With a CVSS score of 9.8, this vulnerability represents a severe threat to business infrastructure. An attacker gaining command execution on a gateway device can bypass perimeter security, sniff internal traffic, or exfiltrate sensitive data, leading to significant operational disruption and data breach risks.

Remediation

Immediate Action: Update the affected Totolink A8000RU device to the latest firmware version provided by the manufacturer.

Proactive Monitoring: Review web server access logs for suspicious patterns in CGI requests, particularly those containing shell metacharacters (e.g., ;, |, &).

Compensating Controls: Disable access to the web-based management interface from untrusted or external networks until the firmware can be patched.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Due to the critical nature of remote code execution on network infrastructure, immediate remediation is required. Affected devices should be isolated from the public internet until the patch is applied.